Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label iOS security. Show all posts

Major Security Flaw in WhatsApp and Signal MacOS Apps Puts User Data at Risk

 

A significant security warning has emerged for WhatsApp and Signal users this week, urging them to consider deleting their apps, particularly on MacOS. The issue, primarily affecting Apple users leveraging multi-device functionality, highlights severe vulnerabilities in the MacOS versions of these popular messaging platforms. Security researcher Tommy Mysk, known for uncovering critical vulnerabilities, recently disclosed that both WhatsApp and Signal MacOS apps store local data, including chat histories and media attachments, in locations accessible to any app or process running on the device. 

This is a stark contrast to Apple’s iMessage, which, despite storing similar data, uses sandboxing to prevent unauthorized access by other apps. The primary concern lies in how these apps handle local data storage. While WhatsApp and Signal emphasize end-to-end encryption for secure message transmission, this protection is compromised if local data can be accessed by other apps or malware. Mysk explained that the chat histories, the core of what these apps are designed to protect, are not sufficiently safeguarded on MacOS. The vulnerability means that if a malicious app gains access to the device, it could potentially monitor and exfiltrate the unencrypted local data. 

For WhatsApp, this includes both chat histories and media attachments. Mysk warned, “WhatsApp doesn’t encrypt the local database that stores chat histories. It doesn’t encrypt media attachments sent through the chat either. A simple malware could theoretically monitor this data and send it live to a remote server, rendering end-to-end encryption useless.” Signal, on the other hand, does encrypt local chat histories but fails to encrypt media attachments. More concerning is that the encryption key for the local chat history is stored in plain text within the same folder, making it accessible to other apps. This flaw undermines the app’s security, as an attacker could clone the local data folder to another device and restore the session. 

Mysk highlighted, “Signal’s false sense of security extends to their back-end servers. When copying the entire folder containing the app’s local data and moving the copy to a different Mac, an attacker can restore the session. Signal servers let the ‘cloned’ session co-exist with the other legit sessions.” The discovery underscores the persistent risk of endpoint compromise for fully encrypted platforms. While end-to-end encryption protects data in transit, the local storage vulnerabilities in these MacOS apps open potential pathways for remote or physical attacks. 

As users continue to rely on messaging apps for secure communication, these revelations call for immediate action from both WhatsApp and Signal to address these security gaps and reinforce their data protection measures on MacOS. For now, users should remain vigilant and consider the potential risks when using these platforms on their Mac devices.

Your iPhone is at risk - Signs of Viruses You Shouldn’t Ignore!

 

Apple usually excels in shielding us from spam and pop-ups. With the myriad functions Apple packs into iPhones, users engage in diverse activities, from work to photos and gaming. While iPhones are considered less susceptible to cyber threats than Androids due to Apple's closed ecosystem, they aren't completely immune. If your iPhone exhibits unusual behaviour or sluggish performance, it could signal a virus. This guide breaks down how iPhones can contract viruses, how to identify an infection, and step-by-step instructions for removal. 
 Realising your iPhone has a virus is unsettling, but the scarier part is not even knowing it's disrupting the mechanism silently. Your device, data, and life could be at risk. Act promptly to prevent further damage by recognising these signs: 

1. Unwanted Apps

 If mysterious apps appear on your phone, ones you didn't download, a virus may be at play. Check your installed apps in settings and promptly uninstall any unfamiliar ones. 

2. Suspicious Configurations

 Unrecognised configuration profiles on your phone could signal a virus. Take a moment to review and delete any that seem out of place. 

3. Pop-Up Overload

While Apple excels at filtering spam, an overwhelming amount of pop-ups is a red flag. Stay cautious; avoid clicking on links from unfamiliar email addresses. 
 

4. Data Surge

Notice a sudden spike in data usage without a clear cause? It might indicate a virus. Check app data usage in Settings and remove any unfamiliar data-consuming apps. 

Apple’s unique operating system design plays a key role. Unlike traditional systems, Apple's OS ensures each app operates in its own separate space, limiting interactions and making it challenging for viruses to spread. Moreover, all apps on iPhones undergo a stringent vetting process in the official App Store, significantly reducing the likelihood of malware-infected apps. While iPhones are generally less susceptible to viruses, it's important to note that a 100% guarantee of immunity does not exist. Recent data suggests a noticeable surge in virus attacks, stressing on the likelihood of digital threats even within the typically secure iPhone environment. 

To stay ahead and steer clear of malware, it's vital to recognize potential signs of a virus. Keep an eye out for consistent app crashes, unexpected charges on your online accounts, rapid battery drain, and overheating – these could be signals of malware. However, it's essential to remember that these issues might also come from other sources, like malfunctioning apps, low memory space, or a weakening battery.

If you suspect a virus, take these steps:

1. Update iOS: Ensure your iOS is up to date to benefit from Apple's latest security patches.

2. Delete Suspicious Apps: Remove any unfamiliar or suspicious apps.

3. Clear Data and History: Navigate to Settings > Safari > Clear History and Website Data.

4. Power Off and Restart: Restart your iPhone by holding down the power button.

5. Change Passwords: Ensure complexity in your passwords.

6. Enable 2-Factor Authentication: Add an extra layer of security.


These measures often resolve issues. However, if problems persist, further actions may be necessary, potentially leading to data loss.


In a nutshell, the rarity of iPhone viruses emphasises the importance of considering other factors causing unusual behaviour. Regularly update iOS, be cautious of app sources, and  against potential threats. Safeguarding your iPhone involves understanding these intricacies and acting promptly when needed. Your digital world is worth protecting – let’s keep it safe.

Fortifying iPhone Security: Stolen Device Protection & Essential Tips Amid Rising Theft Concerns

 

Numerous iPhones, often regarded as some of the best in the market, are pilfered daily on a global scale. Apple aims to address this issue with the upcoming release of iOS 17.3, introducing a feature called Stolen Device Protection.However, this security measure won't be automatically activated; users will need to manually enable it through the Settings app by accessing Face ID & Passcode.

Once activated, Stolen Device Protection will significantly impede thieves from altering the Apple ID password, disabling Find My, or adding a new face to Face ID. The prevalence of iPhone theft, as highlighted in a recent report by The Wall Street Journal, has prompted Apple's swift action to enhance security measures.

The tactics employed by iPhone thieves, such as Aaron Johnson in the U.S., often involve old-fashioned methods. Johnson, and others like him, observed users entering their passcodes and then proceeded to steal, wipe, and resell the stolen smartphones.

A key takeaway from Johnson's approach emphasizes never handing an unlocked phone to anyone. His strategy targeted unsuspecting individuals, primarily young men in social settings, by creating plausible scenarios to gain access to their phones. Victims, often in compromised states, willingly provided their passcodes, unknowingly enabling theft.

To safeguard against such tactics, it's crucial to avoid handing over an unlocked phone to anyone, regardless of the circumstances. Additionally, relying on facial recognition alone might not suffice; utilizing a strong, complex passcode and being vigilant of surroundings during passcode entry can add an extra layer of security.

Another precautionary measure involves individually locking sensitive apps, a feature less straightforward on iPhones compared to many Android devices. While iOS lacks native app-locking functionalities, utilizing Guided Access under Settings > Accessibility allows users to lock specific apps with a different passcode from the device's unlock code.

The visibility of certain iPhone models, particularly those with distinct features like the three-camera setup on the Pro Max versions, makes them more susceptible to theft. Until the implementation of Stolen Device Protection, users must exercise caution when using their iPhones in public settings to mitigate the risk of becoming targets.

While Apple continues to enhance security measures with each iOS update, staying vigilant and implementing precautionary measures remain vital to safeguard against potential theft.

Even When Switched Off, iPhones are Vulnerable to Attack

 

The way Apple combines autonomous wireless technology such as Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB) in the device, researchers determined that it could be exploited by attackers to target iPhones even when they are turned off. 

Such features—which have access to the iPhone's Secure Element (SE), which stores sensitive information—stay on even when modern iPhones are turned off, as per a team of researchers from Germany's Technical University of Darmstadt. This allows attackers to "load malware onto a Bluetooth chip that is performed when the iPhone is off," according to a research study titled "Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhone."

As per Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick of the university's Secure Mobile Networking Lab, attackers can gain access to secure information such as a user's credit card data, banking details, or even digital car keys on the device by compromising these wireless features. Researchers noted that while the risk is real, exploiting the circumstance is not that simple for would-be attackers. Threat actors will still need to load malware onto the iPhone when it is turned on for subsequent execution when it is turned off. This would require system-level access or remote code execution (RCE), which they might gain by exploiting known weaknesses like BrakTooth. 

The main cause of the problem is the existing implementation of low power mode (LPM) for wireless chips on iPhones. The experts distinguished between the LPM which these processors employ and the power-saving program that iPhone users can use to save battery life. Because LPM support is built into the iPhone's hardware, it cannot be deleted with system upgrades, and has "a long-term impact on the broader iOS security paradigm," according to the researchers.

Analysts disclosed their findings to Apple before publishing the study, but they claim the company did not respond to the difficulties revealed by their findings. It is recommended that one possible solution would be for Apple to implement "a hardware-based switch to disconnect the battery" so that these wireless parts would not have power while an iPhone is turned off.

Researchers Make Contactless Visa Payment Using iphone Flaw

 

Cybersecurity experts in a video showed how to make a contactless Visa payment of €1,000 from a locked iphone. These unauthorised payments can be made while the iPhone is locked, it is done via exploiting an Apple Pay feature built to assist users transaction easily at ticket barriers payments with Visa. 

Apple responded by saying the problem is concerned with a Visa system. However, Visa says that its payments are safe and the such attacks lie outside of its lab and are impractical. Experts believe that the problem exists in the Visa cards setup in 'Express Transit' mode in iPhone wallet. 

It is a feature (express transit) which allows users to make fast contactless payments without unlocking their phone. However, the feature turned out to be a drawback with Visa system, as experts found a way to launch an attack. While scientists demonstrated the attack, the money debited was from their personal accounts. 

How does the attack look? 

  • A small radio is placed beside the iPhone, the device thinks of it as a legit ticket barrier. 
  • Meanwhile an android phone runs an application to relay signals (developed by experts) from the iPhone to a contactless transaction platform, it could be in a shop or a place that is controlled by the criminal. 
  • As the iPhone thinks the payment is being done to a ticket barrier, it doesn't unlock. 
However, the iPhone's contact with the transaction platform is altered to make it think that the iPhone has been unlocked and an authorized payment is done which allows high value payments, without the need of fingerprint, PIN, or Face Id verification. 

The experts while demonstrating in a video did a €1,000 Visa transaction without unlocking the iPhone, or authorizing the payment. According to experts, the payment terminals and android phones used here don't need to near the targeted iPhone. 

As of now, the demonstration has only been done by experts in the lab and no reports of the feature exploit in the wild have been reported. "The researchers also tested Samsung Pay, but found it could not be exploited in this way.They also tested Mastercard but found that the way its security works prevented the attack. 

Co-author Dr Ioana Boureanu, from the University of Surrey, said this showed systems could be "both usable and secure". The research is due to be presented at the 2022 IEEE Symposium on Security and Privacy," reports BBC.

Chrome Utilized for iOS Vulnerability by a Threat Group to Bypass the Browser's Built-In Pop-Up Blocker



eGobbler, a threat group recently targeted iOS users from the U.S. alongside various European Union Countries through numerous massive malvertising attacks for almost a week and utilized Chrome for iOS vulnerability to sidestep the browser's built-in in pop blocker.

The said threat group utilized "8 individual campaigns and more than 30 fake creatives" all through their push, with every one of the fake ad crusades having life spans of somewhere in the range of 24 and 48 hours.

As per the Confiant researchers who found and observed eGobbler's iOS-targeted attacks, approximately 500 million users' sessions were somehow exposed to this extensive scale coordinated campaign pushing counterfeit promotions i.e. fake ads.


As found by Confiant's specialists eGobbler's campaigns more often than not remain active for a maximum limit of 48 hours, quickly pursued by brief times of hibernation which unexpectedly end when the next attack begins.

Some of them are even seen to have used landing pages facilitated on .world domains utilizing pop-ups to hi-jack users' sessions and divert the unfortunate casualties to vindictive pages, as this technique helps the attackers in phishing as well as in malware dropping purposes.

Anyway this campaign was not the first of its kind designed by the eGobbler malvertising group to explicitly target iOS users, as in November 2018, Confiant observed one more campaign kept running by the ScamClub group which figured out how to capture approximately 300 million iOS user sessions and diverted them all adult content and gift voucher tricks.

Be that as it may, as Confiant said in their report, "This really was a standout campaign compared to the others that we track based not only on the unique payload, but the volumes as well?"
They later included that “With almost half a billion user sessions impacted, this is among the top three massive malvertising campaigns that we have seen in the last 18 months."